Secure Customer Service Software

Secure Customer Service Software with Vision Helpdesk Security

Secure Customer Service Software or Secure Help Desk Software is our top priority – We apply security measures at different levels – Data Center, Network, Application and Storage Levels, thus making sure our customers data is secure from all sort of threats.

PHYSICAL SECURITY

In order to offer Secure Customer Service Software it starts with physical security first – The Facilities at which Vision Helpdesk servers are located in USA, UK and EU, Tier III + Data centers each one are powered by redundant power, with UPS and backup generators.

Customers can choose to locate their data in the USA, UK or EU data center.

NETWORK SECURITY

In order to deliver Secure Customer Service Software over internet – The network security needs to be paid special attention. Vision Helpdesk’s Security Policy handles network security with below listed methods.

Dedicated Security Team

Our Security Team is on call 24/7 to respond to security alerts and events.

Network Architecture

Our network security architecture consists of multiple security zones of trust. More sensitive systems, like our database servers, are protected in our most trusted zones. Other systems are housed in zones commensurate with their sensitivity, depending on function, information classification, and risk. Depending on the zone, additional security monitoring and access controls will apply.

DMZs are utilised between the Internet, and internally, between the different zones of trust.

Network Vulnerability Scanning

Security Incident Event Management (SIEM)

A security incident event management (SIEM) system gathers extensive logs from important network devices and hosts systems. The SIEM creates triggers that notify the Security team based on correlated events. The Security team responds to these events.

Intrusion Detection and Prevention

Major application data flow ingress and egress points are monitored with Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS). The systems are configured to generate alerts when incidents and values exceed predetermined thresholds and uses regularly updated signatures based on new threats. This includes 24/7 system monitoring.

Threat Intelligence Program

Vision Helpdesk participates in several threat intelligence sharing programs. We monitor threats posted to these threat intelligence networks and take action based on our risk and exposure.

DDoS Mitigation In addition to our own capabilities and tools, we contract with on-demand DDoS scrubbing providers to mitigate Distributed Denial of Service (DDoS) attacks.

Logical Access

Logical access to the Vision Helpdesk Production Network is restricted by an explicit need-to-know basis, utilises least privilege, is frequently audited and monitored, and is controlled by our Operations Team. Employees accessing the Vision Helpdesk Production Network are required to use multiple factors of authentication.

Security Incident Response

In case of a system alert, events are escalated to our 24/7 teams providing Operations, Network Engineering, and Security coverage. Employees are trained on security incident response processes, including communication channels and escalation paths.

APPLICATION SECURITY

Achieving 100% Secure Customer Service Software is impossible without having the security measures applied at the application level. we take various steps to secure Vision Helpdesk at application level.

Separate Environments Testing and staging environments are separated physically and logically from the production environment. No actual customer data is used in the development or test environments.

APPLICATION VULNERABILITIES

Dynamic Vulnerability Scanning

We employ a number of third-party, qualified security tools to continuously scan our application. Vision Helpdesk is scanned regularly against the OWASP Top 10 security flaws. We maintain a dedicated in-house product security team to test and work with engineering teams to re-mediate any discovered issues.